ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Agronomy and forestry
Social Sciences
Biology
Education
Technology
Research
Architecture and Urbanism
Computing
Computing
Public health
all records (73)

Languages
English
Spanish
German
Portuguese

Countries
Indonesia
USA
Brazil
South Africa
Romania
Canada
Ukraine
Spain
Denmark
Poland
all records (74)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
6.241  Articles
1 of 625 pages  |  10  records  |  more records»
Mobile devices are vulnerable to shoulder surfing and smudge attacks, which should occur when a user enters a PIN for authentication purposes. This attack can be avoided by implementing a rotary entry pad mechanism. Despite this, several studies have foun... see more

Classical PIN-entry methods are vulnerable to a broad class of observation attacks (shoulder surfing, key-logging).A number of alternative PIN-entry methods that are based on human cognitive skills have been proposed. These methods can be classified into ... see more

We present a safe graphical verification arrangement named Pass Matrix that defends users from flattering fatalities of bear surfing attacks when entering passwords in community through the custom of one-time login indicators. A login indicator is arbitra... see more

AbstractFrozen shoulder is a condition where there is inflammation, pain, adhesions, atrophy and shortening the joint capsule of the shoulder joint, causing limitations. Attacks are usually unilateral, occurring more among women than men and it is more co... see more

AbstractFrozen shoulder is a condition where there is inflammation, pain, adhesions, atrophy and shortening the joint capsule of the shoulder joint, causing limitations. Attacks are usually unilateral, occurring more among women than men and it is more co... see more

Development of the fighting arts begins with universal principles found in human anatomy. As a result, in every culture we find combative techniques that share common tactics and applications. Additionally, many techniques travel across cultures. To illus... see more

The operational plansThe attack on Iraq, or Operation Iraqi Freedom as it was called, would be very different from its predecessor Operation Desert Storm, 12 years before. The main strategic difference was, of course, the fact that Desert Storm encompasse... see more

In the state of Florida, there are approximately five shark attacks that occur annually. To date, shark attack “hot spots” throughout the state appear to be purely anecdotal, rooted in local lore. The goal of this study was to identify areas of high shark... see more

1 of 625 pages  |  10  records  |  more records»